The Mohansh Technology Cyber Security Course in Hyderabad equips students with the most effective techniques for infrastructure and business protection.
In the ever-evolving landscape of cybersecurity, Security Operations Center (SOC) Analysts play a pivotal role in safeguarding organizations from cyber threats. This course is meticulously designed to equip you with the essential skills and practical experience required to excel in SOC operations.
Day 1: Introduction to Cybersecurity & Threat Landscape
Day 2: Role of SOC Analyst (L1, L2, L3 Responsibilities)
Day 3: SOC Tools & Technologies Overview (SIEM, SOAR, IDS/IPS, EDR)
Day 4: Network Basics for SOC (TCP/IP, Ports, Protocols)
Day 5: Understanding Firewalls, Proxies, VPNs
Day 6: Introduction to Linux & Windows Commands for SOC Monitoring
Day 7: Lab – Basic Log Monitoring & Command-Line Exercises
Â
Day 8: Introduction to SIEM – Purpose & Architecture
Day 9: Log Sources – Firewalls, Servers, Endpoints
Day 10: Event Normalization, Parsing, and Enrichment
Day 11: Writing Basic Queries in SIEM (Splunk SPL / QRadar AQL)
Day 12: Hands-on – Search Queries for Suspicious Activities
Day 13: Building Dashboards & Alerts
Day 14: Lab – Detect Brute-Force Attacks in SIEM
Â
Day 15: Cyber Kill Chain & MITRE ATT&CK Framework
Day 16: Malware, Phishing, Ransomware Basics
Day 17: Endpoint Attack Indicators & EDR Tools (CrowdStrike, Defender ATP)
Day 18: Lab – Analyze Phishing Email Headers & Attachments
Day 19: IDS/IPS Monitoring & Snort/Suricata Basics
Day 20: Lab – Detect Port Scans Using SIEM/IDS Logs
Day 21: Case Study – Real-World Incident Analysis
Â
Day 22: Threat Intelligence Platforms (TIPs, OSINT)
Day 23: IOC Types – IPs, Hashes, Domains, Emails
Day 24: Hands-on – IOC Enrichment with VirusTotal, AlienVault OTX
Day 25: Basics of Digital Forensics – Chain of Custody
Day 26: Memory & Disk Forensics (Volatility, FTK Imager)
Day 27: Lab – Analyze Malware Sample in Sandbox
Day 28: Weekly Project – Build Threat Intel Report
Day 29: Incident response lifecycle (NIST, SANS model)
Day 30: Containment, eradication, and recovery steps
Day 31: Playbooks – phishing, malware, brute-force attack
Day 32: Lab – execute phishing response playbook in SIEM
Day 33: SOAR introduction & automation basics
Day 34: Lab – automate IOC enrichment with SOAR
Day 35: Project – build a phishing incident response playbook
Day 36: Threat Hunting Concepts & Proactive Defense
Day 37: Hypothesis-Based Hunting with SIEM Queries
Day 38: Lab – Hunt for Persistence Techniques Using Logs
Day 39: Insider Threat Detection & UEBA (User Behavior Analytics)
Day 40: Red Team vs Blue Team – SOC Collaboration
Day 41: Lab – Simulate Red vs Blue Scenario in SIEM
Day 42: Weekly Project – Threat Hunt Report
Â
Day 43 — Red team tactics & adversary emulation (MITRE ATT&CK mapping)Â
Day 44 — Social engineering & phishing awareness (theory & planning)Â
Day 45 — Capstone overview: end‑to‑end penetration test methodology & reporting
Come and discuss your objectives with us.